Quantum key distribution with high loss: toward global secure communication.

@article{Hwang2003QuantumKD,
  title={Quantum key distribution with high loss: toward global secure communication.},
  author={Won Young Hwang},
  journal={Physical review letters},
  year={2003},
  volume={91 5},
  pages={
          057901
        }
}
  • W. Hwang
  • Published 24 November 2002
  • Computer Science, Physics
  • Physical review letters
We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A legitimate user intentionally and randomly replaces signal pulses by multiphoton pulses (decoy pulses). Then they check the loss of the decoy pulses. If the loss of the decoy pulses is abnormally less than that of signal pulses, the whole protocol is aborted. Otherwise, to continue the protocol, they estimate the loss of… 

Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source

The method of decoy-state quantum key distribution requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here the authors propose a simple protocol

Time-shift quantum key distribution with decoy states

A protocol for quantum key distribution—a technology allowing two distant parties to create an unconditionally secure cryptographic key is suggested, using laser pulses weakened to the single-photon level of duration T.

Security of decoy-state quantum key distribution with imperfect phase randomization

This work provides a security proof for decoy-state QKD with correlated phases that provides key rates close to the ideal scenario and paves the way towards high-performance QkD with practical laser sources.

Decoy-pulse protocol for frequency-coded quantum key distribution

This work proposes a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol and discusses the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.

Decoy pulse quantum key distribution for practical purposes

The random bits from the secure keys are found to pass stringent statistical tests and the decoy pulse protocol employed uses two weak pulses (signal and decoy) and one vacuum pulse.

SECURITY OF QUANTUM KEY DISTRIBUTION WITH STRONG PHASE-REFERENCE PULSE

In the BB84 protocol with a perfect single photon source, the key rate decreases linearly with the transmission η of the channel. If we simply replace this source with a weak coherent-state pulse,

Security of the decoy state method for quantum key distribution

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

Photon-number-resolving decoy-state quantum key distribution

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

Nonorthogonal decoy-state Quantum Key Distribution

In practical quantum key distribution (QKD), weak coherent states as the photon sources have a limit in secure key rate and transmission distance because of the existence of multiphoton pulses and

Quantum key distribution with distinguishable decoy states

An analytical formula is obtained to estimate the yield and error rate of single-photon pulses when the signal and decoy states are distinguishable, which reduces the secure key rate below that of a perfect decoy-state protocol.
...